Security privacy protection method and system based on ECC encryption
A privacy protection system and privacy protection technology, applied in key distribution, can solve the problems of user privacy data leakage, illegal devices accessing network services, and secure communications that are easily overcome and cracked by eavesdroppers, to achieve the effect of ensuring data security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The implementation of the present invention is described below through specific examples and in conjunction with the accompanying drawings, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific examples, and various modifications and changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.
[0038] figure 1 It is a flow chart of steps of an ECC encryption-based security and privacy protection method of the present invention. Such as figure 1 Shown, a kind of security privacy protection method based on ECC encryption of the present invention comprises the following steps:
[0039] Step 101, the client device applies for registration to the central office device, and provides t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 